Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Source
Author
Nickerson, Gord | 3 |
Notess, Greg R. | 3 |
Boldt, David J. | 2 |
Broderick, Bill | 2 |
Caverly, David C. | 2 |
Dern, Daniel P. | 2 |
Eastmond, Dan | 2 |
Granger, Dan | 2 |
Guernsey, Lisa | 2 |
Hazari, Sunil | 2 |
Kinkead, Joyce | 2 |
More ▼ |
Publication Type
Education Level
Higher Education | 4 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Location
Japan | 4 |
Pennsylvania | 4 |
United States | 4 |
Michigan | 3 |
United Kingdom | 3 |
Illinois | 2 |
Indiana | 2 |
Minnesota | 2 |
New Hampshire | 2 |
New York | 2 |
Texas | 2 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Fair Labor Standards Act | 1 |
Family Educational Rights and… | 1 |
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Ozan, Ozlem – Turkish Online Journal of Distance Education, 2013
Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: (1) to learn in a networked environment; (2) to manage their…
Descriptors: Foreign Countries, Social Networks, Distance Education, Educational Environment
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
O'Hanlon, Charlene – T.H.E. Journal, 2009
On Dec. 1, 2006, the once ambiguous role of e-mails in court cases became much more clear. On that day, the Federal Rules of Civil Procedure (FRCP), which govern federal civil litigation, were amended to establish standards for the discovery of electronically stored information, now known as e-discovery. Many corporations began moving quickly to…
Descriptors: Emergency Programs, Labor Standards, School Districts, Court Litigation
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Trotter, Andrew – Education Week, 2006
This article deals with federal E-rate program's support of school leaders' Blackberry habit. The Federal Communications Commission (FCC) has cleared the way to allow money from the $2.25 billion program of subsidies for school technology to apply to e-mail service for mobile, wireless devices, such as the BlackBerry, which are increasingly…
Descriptors: Internet, Electronic Mail, Telecommunications, Computer Networks
Hazari, Sunil – Collegiate Microcomputer, 1990
Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)
Descriptors: Computer Networks, Electronic Mail, Higher Education, Telecommunications
Parker, Donald C. – Executive Educator, 1987
Describes an electronic mail system used by the Horseheads (New York) Central School Distict's eight schools and central office that saves time and enhances productivity. This software calls up information from the district's computer network and sends it to other users' special files--electronic "mailboxes" set aside for messages and…
Descriptors: Computer Networks, Efficiency, Electronic Mail, Elementary Secondary Education

Alm, Andy – Convergence, 1992
Describes computer networks and conferences dedicated to environmental education and activism. Gives the electronic and surface mail addresses of contacts for the Association for Progressive Communications in 12 countries. (SK)
Descriptors: Computer Networks, Electronic Mail, Environmental Education, Organizations (Groups)
Nickerson, Gord – Computers in Libraries, 1992
Discussion of computer-mediated communication focuses on the development of the BITNET computer network. The use of BITNET for interactive messaging, batch file transfer, and electronic mail is described; server programs are explained; and possible future developments of BITNET are discussed. (seven references) (LRW)
Descriptors: Computer Networks, Computer Software, Electronic Mail, Futures (of Society)

Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Moore, Jack – Exceptional Parent, 1988
The article describes the IBM/Special Needs Exchange which consists of: (1) electronic mail, conferencing, and a library of text and program files on the CompuServe Information Service; and (2) a dial-in database of special education software for IBM and compatible computers. (DB)
Descriptors: Computer Networks, Computer Software, Disabilities, Electronic Mail

Fassett, William E. – American Journal of Pharmaceutical Education, 1988
PHARMLINE, the electronic bulletin board operated by the American Association of Colleges of Pharmacy, is described. Bulletin boards do not provide the opportunity for file and message transfer throughout the continent and overseas, as does BITNET, the network link among universities. (Author/MLW)
Descriptors: Computer Networks, Electronic Mail, Higher Education, Pharmaceutical Education

Murphy, Avon J. – Technical Communication: Journal of the Society for Technical Communication, 1995
Presents 46 brief descriptions of books about the Internet published between 1993 and mid-1994. (SR)
Descriptors: Annotated Bibliographies, Computer Networks, Electronic Mail, Higher Education

Gauger, Robert – Technology Teacher, 1995
Explains available electronic communication and research tools and provides suggestions for using the Internet to enhance technology education. (SK)
Descriptors: Computer Networks, Electronic Mail, Information Seeking, Information Sources